Xingshu Chen
Orcid: 0000-0002-8705-2617
According to our database1,
Xingshu Chen
authored at least 79 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Peer Peer Netw. Appl., February, 2025
2024
Connect. Sci., December, 2024
Enhancing TinyML-Based Container Escape Detectors With Systemcall Semantic Association in UAVs Networks.
IEEE Internet Things J., June, 2024
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs.
Peer Peer Netw. Appl., May, 2024
IEEE Trans. Comput. Soc. Syst., February, 2024
Detecting Spam Movie Review Under Coordinated Attack With Multi-View Explicit and Implicit Relations Semantics Fusion.
IEEE Trans. Inf. Forensics Secur., 2024
A novel cross-domain adaptation framework for unsupervised criminal jargon detection via pre-trained contextual embedding of darknet corpus.
Expert Syst. Appl., 2024
A deep semantic-aware approach for Cantonese rumor detection in social networks with graph convolutional network.
Expert Syst. Appl., 2024
An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool (SPP).
Comput. Secur., 2024
Comput. Secur., 2024
Interaction matters: Encrypted traffic classification via status-based interactive behavior graph.
Appl. Soft Comput., 2024
2023
Laws and Regulations tell how to classify your data: A case study on higher education.
Inf. Process. Manag., May, 2023
Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency Between Embedding Vectors.
IEEE Trans. Cybern., April, 2023
Inf. Sci., April, 2023
Identifying Cantonese rumors with discriminative feature integration in online social networks.
Expert Syst. Appl., April, 2023
J. Netw. Comput. Appl., March, 2023
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud.
Soft Comput., 2023
Listen carefully to experts when you classify data: A generic data classification ontology encoded from regulations.
Inf. Process. Manag., 2023
CoRR, 2023
RAUCG: Retrieval-Augmented Unsupervised Counter Narrative Generation for Hate Speech.
CoRR, 2023
DKCS: A Dual Knowledge-Enhanced Abstractive Cross-Lingual Summarization Method Based on Graph Attention Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform.
IEEE Trans. Ind. Informatics, 2022
Knowl. Based Syst., 2022
Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground-Integrated Networks: Attestation Approach.
IEEE Internet Things J., 2022
Privacy-preserving Security Inference Towards Cloud-Edge Collaborative Using Differential Privacy.
CoRR, 2022
CoRR, 2022
Detecting Offensive Language on Social Networks: An End-to-end Detection Method based on Graph Attention Networks.
CoRR, 2022
Comput. Networks, 2022
MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform.
Proceedings of the 12th International Conference on Communication and Network Security, 2022
Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder.
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE Global Communications Conference, 2022
ApkClassiFy: Identification and Classification of packed Android Malicious Applications.
Proceedings of the IEEE Global Communications Conference, 2022
Fake Restaurant Review Detection Using Deep Neural Networks with Hybrid Feature Fusion Method.
Proceedings of the Database Systems for Advanced Applications, 2022
vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022
2021
User Identification Based on Integrating Multiple User Information across Online Social Networks.
Secur. Commun. Networks, 2021
PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Improving adversarial robustness of deep neural networks by using semantic information.
Knowl. Based Syst., 2021
End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network.
Neurocomputing, 2021
Analyzing Adversarial Robustness of Deep Neural Networks in Pixel Space: a Semantic Perspective.
CoRR, 2021
2020
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data.
IEEE Trans. Inf. Forensics Secur., 2020
Secur. Commun. Networks, 2020
Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm.
Knowl. Based Syst., 2020
J. Inf. Secur. Appl., 2020
An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network.
CoRR, 2020
Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency between Embedding Vectors.
CoRR, 2020
An efficient scheme for SDN state consistency verification in cloud computing environment.
Concurr. Comput. Pract. Exp., 2020
2019
Secur. Commun. Networks, 2019
IEEE Access, 2019
IEEE Access, 2019
Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach.
IEEE Access, 2019
2018
SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-Based IoT Context.
Wirel. Commun. Mob. Comput., 2018
Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis.
IET Commun., 2018
2017
Int. J. Commun. Syst., 2017
Research and implementation of a high performance parallel computing digital down converter on graphics processing unit.
Concurr. Comput. Pract. Exp., 2017
2016
A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory.
Secur. Commun. Networks, 2016
2014
J. Networks, 2014
An efficient method of P2P traffic identification based on wavelet packet decomposition and kernel principal component analysis.
Int. J. Commun. Syst., 2014
2013
Accelerated k-nearest neighbors algorithm based on principal component analysis for text categorization.
J. Zhejiang Univ. Sci. C, 2013
Proceedings of the Fifth International Conference on Digital Image Processing, 2013
2012
J. Comput., 2012
2010
Proceedings of the Security Informatics, 2010
A Novel P2P Identification Algorithm Based on Genetic Algorithm and Particle Swarm Optimization.
Proceedings of the Third International Symposium on Parallel Architectures, 2010
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
2008
Constrained k-closest pairs query processing based on growing window in crime databases.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
An Optimized Parallel FFT Algorithm on Multiprocessors with Cache Technology in Linux.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008